Bolster is excited to share a major landmark in our path to making the internet a safer place…

The Bolster Blog
Thought provoking blogs discussing recent trends on digital risk protection services, phishing protection, threat intelligence, artificial intelligence, machine learning, brand protection and more!
Recent Posts
The Growing Attack Surface From AI Generated Fraud
This week, Sam Altman warned society is on the brink of a global fraud crisis, driven by AI’s ability to convincingly impersonate people using voice,.
The ROI of Brand Protection: Why Safeguarding Your Brand Pays Off
Brand abuse isn’t just a nuisance—it’s a threat to your revenue, reputation, and long-term growth. From phishing scams to counterfeit goods to fake websites, bad.

Buyer’s Guide: Purchasing a Brand Security Solution
Your brand is constantly under attack. To stay protected, you need an AI-powered brand security solution that keeps up with today’s AI-driven threats. Not sure what to look for? Use the Bolster AI Buyer’s Guide to evaluate your options.
Scamming the Scammers: Phishing Kit Creator is Stealing the Telegram Token from Scammers
At Bolster Research Labs, we recently observed that phishing kit…
Ad-ventures: Investigating the Misuse of Google Ads in Malvertising Campaigns
In the sprawling extent of the internet, Google Ads has…
Beyond Phishing: The Rising Threat of Stealer Logs Compromising Security
The arms race between cyber defenders and attackers is becoming…
Image Similarity for Brand Detection: A Comparison Between BEiT, SWIN and ViT-MAE
Brand detection is a critical component of Bolster AI, gathered…
Phishing in Disguise: Threat Actors Turning Legitimate Sites Into Antivirus Traps
Antivirus vendors have significantly been impacted by the latest phishing…
Dissecting the Phishing Kit behind the Axis Bank Reward Points Campaign
Phishing campaigns targeting banking and financial institutions have always been…
VIT-MAE: Scalable Learning for Vision Transformers
Unprecedented gains in hardware capabilities and model sizes have compelled…
Dissecting the Newest Phishing Kit Targeting the Qatar Post
Name brand postal services have been increasingly targeted by phishing…
The Dark Underbelly of the Internet: Bulletproof Hosting and Phishing Epidemic
What is Bullet Proof Hosting [BPH]? Within the digital community,…
SWIN Transformers: The Best of Two Worlds
The search for a transformer based backbone model suitable to…
Analyzing Advanced Multi-Lingual Tech Support Phishing Kits Hosted on SaaS Providers
The Tech Support Scam consistently remains in the spotlight due…
Beyond Hashing: The Future of Anti-Phishing is Image Similarity Search
Computer vision modules are a critical component in a cybersecurity…